In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
1 A new architecture like Croquet presents numerous opportunities and challenges to create useful interfaces to enable access to the underlying power of the system. In particular, ...
David A. Smith, Andreas Raab, David P. Reed, Alan ...
Active database systems (ADBS) can, automatically, react to the occurrence of predefined events by definition a collection of active rules. One of the most important modules of AD...
Abbas Rasoolzadegan, Rohollah Alesheykh, Ahmad Abd...
System-level design methods specifically targeted towards multimedia applications have recently received a lot of attention. Multimedia workloads are known to have a high degree o...